
000 | 00000cam u2200205 a 4500 | |
001 | 000046146020 | |
005 | 20230407113140 | |
008 | 230406s2022 maua b 001 0 eng | |
010 | ▼a 2020018594 | |
020 | ▼a 9781284199840 ▼q (paperback) | |
035 | ▼a (KERIS)REF000019305701 | |
040 | ▼a LBSOR/DLC ▼b eng ▼c DLC ▼e rda ▼d DLC ▼d 211009 | |
042 | ▼a pcc | |
050 | 0 0 | ▼a QA76.9.A25 ▼b J64 2022 |
082 | 0 0 | ▼a 005.8 ▼2 23 |
084 | ▼a 005.8 ▼2 DDCK | |
090 | ▼a 005.8 ▼b J682s3 | |
100 | 1 | ▼a Johnson, Rob ▼q (Robert). |
245 | 1 0 | ▼a Security policies and implementation issues / ▼c Robert Johnson, Chuck Easttom. |
250 | ▼a 3rd ed. | |
260 | ▼a Burlington, MA : ▼b Jones & Bartlett Learning, ▼c 2022. | |
264 | 1 | ▼a Burlington, MA : ▼b Jones & Bartlett Learning, ▼c [2022] |
300 | ▼a xvii, 476 p. : ▼b ill. ; ▼c 23 cm. | |
336 | ▼a text ▼b txt ▼2 rdacontent | |
337 | ▼a unmediated ▼b n ▼2 rdamedia | |
338 | ▼a volume ▼b nc ▼2 rdacarrier | |
504 | ▼a Includes bibliographical references and index. | |
505 | 0 | ▼a Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies. |
520 | ▼a "Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"-- ▼c Provided by publisher. | |
650 | 0 | ▼a Computer security. |
700 | 1 | ▼a Easttom, Chuck, ▼e author. |
945 | ▼a ITMT |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 J682s3 | 등록번호 121262856 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |